How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
CRYPTO '89 Proceedings on Advances in cryptology
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group
SIAM Journal on Discrete Mathematics
Chinese remainder theorem: applications in computing, coding, cryptography
Chinese remainder theorem: applications in computing, coding, cryptography
Signature schemes based on the strong RSA assumption
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Robust threshold DSS signatures
Information and Computation
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Sharing Decryption in the Context of Voting or Lotteries
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Some Recent Research Aspects of Threshold Cryptography
ISW '97 Proceedings of the First International Workshop on Information Security
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Two-party generation of DSA signatures
International Journal of Information Security - Special issue on security in global computing
Optimal resilient threshold GQ signatures
Information Sciences: an International Journal
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A simple threshold authenticated key exchange from short secrets
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Private searching on streaming data
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
A modular approach to key safeguarding
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Unconditionally secure cryptosystems based on quantum cryptography
Information Sciences: an International Journal
New efficient and practical verifiable multi-secret sharing schemes
Information Sciences: an International Journal
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
A multisecret sharing scheme for color images based on cellular automata
Information Sciences: an International Journal
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Selling multiple secrets to a single buyer
Information Sciences: an International Journal
Practical Threshold Signatures with Linear Secret Sharing Schemes
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Robust threshold schemes based on the Chinese remainder theorem
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Multipolarity for the object naming service
IOT'08 Proceedings of the 1st international conference on The internet of things
Secret sharing schemes from binary linear codes
Information Sciences: an International Journal
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Information Sciences: an International Journal
Distributed privacy preserving data collection
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
Information Sciences: an International Journal
Sharing DSS by the Chinese Remainder Theorem
Journal of Computational and Applied Mathematics
Hi-index | 0.07 |
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography.